Gloom, doom and Gutnick
The implications of Dow Jones & Company Inc v Gutnick [1] are reviewed by Megan Macgregor, Senior Lawyer, and Mark Vincent, Managing Partner, of Griffins Information Technology and Intellectual Property Lawyers. [2]…
The implications of Dow Jones & Company Inc v Gutnick [1] are reviewed by Megan Macgregor, Senior Lawyer, and Mark Vincent, Managing Partner, of Griffins Information Technology and Intellectual Property Lawyers. [2]…
We asked a number of legal IT experts to offer their predictions for 2003….
The expected explosion in e-commerce requires a solution to the problems that arise with payments, and the ever-present security threat. Christopher Scroggs and Rebecca Nugent of Laytons examine the issues….
Craig Earnshaw, head of the Forensic Computing Services group of Lee & Allen Consulting Limited, discusses the implications of an addition to the practice direction for the execution of Search and Seize Orders….
Alex Mitchell and Andrea Ruggieri of Baker & McKenzie emphasise the importance of having an effective source code escrow strategy….
W. K. Hon thinks the Psion 5mx still rules….
Paul Berwin reviews the SCL IT Law Review, held at Bath on 8-9 November 2002….
The shortlist for the SCL IT Award has been announced. Laurence Eastham contacted the runners; he gives a brief description of each and comments on their chances for those stopping off at Ladbrokes on the way to the ceremony….
Law firms around the world are talking about the ‘processization’ and “commoditisation” of legal services. Indeed, many lawyers regard certain legal services as ideal areas of practice for this. Iain Unett formerly a senior lawyer with British Telecommunications Plc and now Product Development Director with Lexfutura, the strategic knowledge and technology hub, discusses the advent of workflow systems…
Read More… from The Advent of Workflow Solutions in Legal Services
Rupert Kendrick LL.M looks at strategies for coping with some key Internet risks. Rupert Kendrick LL.M is author of Managing Cyber-Risks (Law Society Publishing June 2002) which explains how to develop a cyber-risk management structure and use it as a springboard to develop new business opportunities…